Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe
Resource
win10v2004-20240226-en
General
-
Target
63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe
-
Size
87KB
-
MD5
ab639eb2eecd4b4724a4920128ae5c7e
-
SHA1
fc8a04433be9a046a02e86e1c7d444ff33521836
-
SHA256
63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0
-
SHA512
5dc4d1329c64c072d206e4d834291fbc54fb68b2924aa99e260e069f7c588d9396dfed291fba80ebd8ff49fa254f1479e6714cbe18973c05ad5066bd95c19cfa
-
SSDEEP
1536:1a3+ddygX7y9v7Z+NoykJHBOAFRfBjG3ldoIy:08dfX7y9DZ+N7eB+IIy
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\recycled\\SVCHOST.exe\"" SPOOLSV.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\Fonts\\\u00a0Explorer.exe\"" SVCHOST.EXE -
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SPOOLSV.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SVCHOST.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SPOOLSV.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SVCHOST.EXE -
Executes dropped EXE 12 IoCs
pid Process 2536 SVCHOST.EXE 2560 SVCHOST.EXE 2588 SVCHOST.EXE 2564 SVCHOST.EXE 2424 SVCHOST.EXE 2456 SPOOLSV.EXE 1868 SVCHOST.EXE 2800 SVCHOST.EXE 2952 SPOOLSV.EXE 2696 SPOOLSV.EXE 1712 SVCHOST.EXE 2320 SPOOLSV.EXE -
Loads dropped DLL 20 IoCs
pid Process 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Recycled\desktop.ini 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened for modification F:\Recycled\desktop.ini 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\W: SVCHOST.EXE File opened (read-only) \??\I: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\O: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\M: SVCHOST.EXE File opened (read-only) \??\S: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\Y: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\Z: SPOOLSV.EXE File opened (read-only) \??\T: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\W: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\V: SPOOLSV.EXE File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\Q: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\U: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\S: SPOOLSV.EXE File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\I: SPOOLSV.EXE File opened (read-only) \??\L: SPOOLSV.EXE File opened (read-only) \??\N: SPOOLSV.EXE File opened (read-only) \??\J: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\U: SVCHOST.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\G: SPOOLSV.EXE File opened (read-only) \??\H: SPOOLSV.EXE File opened (read-only) \??\K: SPOOLSV.EXE File opened (read-only) \??\T: SPOOLSV.EXE File opened (read-only) \??\K: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\P: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\O: SVCHOST.EXE File opened (read-only) \??\W: SVCHOST.EXE File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\X: SPOOLSV.EXE File opened (read-only) \??\L: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\M: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\N: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\J: SPOOLSV.EXE File opened (read-only) \??\R: SPOOLSV.EXE File opened (read-only) \??\U: SPOOLSV.EXE File opened (read-only) \??\Y: SPOOLSV.EXE File opened (read-only) \??\H: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\R: 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\U: SVCHOST.EXE -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\ Explorer.exe SPOOLSV.EXE File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened for modification C:\Windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\docicon.exe 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe File opened for modification C:\Windows\Fonts\ Explorer.exe SVCHOST.EXE File opened for modification C:\Windows\Fonts\ Explorer.exe SVCHOST.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command WINWORD.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\SHELL\CONFIG\COMMAND 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Windows\\Installer\\{90140000-0011-0000-0000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\ = "&Edit" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\QuickTip = "prop:Type;Size" 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 WINWORD.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SPOOLSV.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\TileInfo = "prop:Type;Size" 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit WINWORD.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Windows\\Installer\\{90140000-0011-0000-0000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1532 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2456 SPOOLSV.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2536 SVCHOST.EXE 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2456 SPOOLSV.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2588 SVCHOST.EXE 2456 SPOOLSV.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 2536 SVCHOST.EXE 2560 SVCHOST.EXE 2588 SVCHOST.EXE 2564 SVCHOST.EXE 2424 SVCHOST.EXE 2456 SPOOLSV.EXE 1868 SVCHOST.EXE 2800 SVCHOST.EXE 2952 SPOOLSV.EXE 2696 SPOOLSV.EXE 1712 SVCHOST.EXE 2320 SPOOLSV.EXE 1532 WINWORD.EXE 1532 WINWORD.EXE -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2536 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 28 PID 2236 wrote to memory of 2536 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 28 PID 2236 wrote to memory of 2536 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 28 PID 2236 wrote to memory of 2536 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 28 PID 2536 wrote to memory of 2560 2536 SVCHOST.EXE 29 PID 2536 wrote to memory of 2560 2536 SVCHOST.EXE 29 PID 2536 wrote to memory of 2560 2536 SVCHOST.EXE 29 PID 2536 wrote to memory of 2560 2536 SVCHOST.EXE 29 PID 2536 wrote to memory of 2588 2536 SVCHOST.EXE 30 PID 2536 wrote to memory of 2588 2536 SVCHOST.EXE 30 PID 2536 wrote to memory of 2588 2536 SVCHOST.EXE 30 PID 2536 wrote to memory of 2588 2536 SVCHOST.EXE 30 PID 2588 wrote to memory of 2564 2588 SVCHOST.EXE 31 PID 2588 wrote to memory of 2564 2588 SVCHOST.EXE 31 PID 2588 wrote to memory of 2564 2588 SVCHOST.EXE 31 PID 2588 wrote to memory of 2564 2588 SVCHOST.EXE 31 PID 2588 wrote to memory of 2424 2588 SVCHOST.EXE 32 PID 2588 wrote to memory of 2424 2588 SVCHOST.EXE 32 PID 2588 wrote to memory of 2424 2588 SVCHOST.EXE 32 PID 2588 wrote to memory of 2424 2588 SVCHOST.EXE 32 PID 2588 wrote to memory of 2456 2588 SVCHOST.EXE 33 PID 2588 wrote to memory of 2456 2588 SVCHOST.EXE 33 PID 2588 wrote to memory of 2456 2588 SVCHOST.EXE 33 PID 2588 wrote to memory of 2456 2588 SVCHOST.EXE 33 PID 2456 wrote to memory of 1868 2456 SPOOLSV.EXE 34 PID 2456 wrote to memory of 1868 2456 SPOOLSV.EXE 34 PID 2456 wrote to memory of 1868 2456 SPOOLSV.EXE 34 PID 2456 wrote to memory of 1868 2456 SPOOLSV.EXE 34 PID 2456 wrote to memory of 2800 2456 SPOOLSV.EXE 35 PID 2456 wrote to memory of 2800 2456 SPOOLSV.EXE 35 PID 2456 wrote to memory of 2800 2456 SPOOLSV.EXE 35 PID 2456 wrote to memory of 2800 2456 SPOOLSV.EXE 35 PID 2456 wrote to memory of 2952 2456 SPOOLSV.EXE 36 PID 2456 wrote to memory of 2952 2456 SPOOLSV.EXE 36 PID 2456 wrote to memory of 2952 2456 SPOOLSV.EXE 36 PID 2456 wrote to memory of 2952 2456 SPOOLSV.EXE 36 PID 2536 wrote to memory of 2696 2536 SVCHOST.EXE 37 PID 2536 wrote to memory of 2696 2536 SVCHOST.EXE 37 PID 2536 wrote to memory of 2696 2536 SVCHOST.EXE 37 PID 2536 wrote to memory of 2696 2536 SVCHOST.EXE 37 PID 2236 wrote to memory of 1712 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 38 PID 2236 wrote to memory of 1712 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 38 PID 2236 wrote to memory of 1712 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 38 PID 2236 wrote to memory of 1712 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 38 PID 2236 wrote to memory of 2320 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 39 PID 2236 wrote to memory of 2320 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 39 PID 2236 wrote to memory of 2320 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 39 PID 2236 wrote to memory of 2320 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 39 PID 2236 wrote to memory of 1532 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 40 PID 2236 wrote to memory of 1532 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 40 PID 2236 wrote to memory of 1532 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 40 PID 2236 wrote to memory of 1532 2236 63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe 40 PID 1532 wrote to memory of 2020 1532 WINWORD.EXE 43 PID 1532 wrote to memory of 2020 1532 WINWORD.EXE 43 PID 1532 wrote to memory of 2020 1532 WINWORD.EXE 43 PID 1532 wrote to memory of 2020 1532 WINWORD.EXE 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe"C:\Users\Admin\AppData\Local\Temp\63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2424
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
-
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2320
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\63f6744d66d7b0c265c49b9c0925c6e8376eee89babb91c04412e348d577a5e0.doc"2⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51a1dce35d60d2c70ca8894954fd5d384
SHA158547dd65d506c892290755010d0232da34ee000
SHA2562661c05273f33efa4b7faa6ed8a6f7e69a13ad86077f69ee285ece9cba57e44c
SHA5124abe37613145fabeb44ea4c28ecc827c8a0eb2b003e86ae7aef9be5687711fa7a294f17567ea0a70a6f14ab3cbe7886c83763a7c49278097fd53f0d11fd8154e
-
Filesize
87KB
MD5074a7cc5deaa6095b37695c8bbce48aa
SHA145f7a85ffd9ff0cce09d22ee5da5037e50d6e1c8
SHA256d024dd62f7be6473e1d86915ce9cca35cbe62216c8cd51bbe6dabc75b49c53c0
SHA512a43c9d0e17511ae888e1236e300a43d41f21983cc66f630067e0da70b25c85687c34ad7e97a97fa922d55ef68b6afdd8edf04c1d8ea541958f8accaf3ad25446
-
Filesize
87KB
MD5c238d734a4687c27378f431b5ba87a58
SHA123cf78211ad7ebe46d13da1fe822f4f0a556e3e2
SHA256aa9130704afe4eafbdb5766d69f11fdfc347ddcad7a983d91f9ceb719aaaad58
SHA51226350935734a01e8d9d3c074e3f9fbac36e1ebdb6e02389da4e27cc6d3467c39f9c9a9d78f70298a628599e49e2b71aa3d9e3f2ba29bbcf289efa6fa6567779b
-
Filesize
87KB
MD528da013a257d7169cdfe800e79cc01af
SHA12d275bd23d36a547d864b25049080e58a66df83e
SHA2566c83c23d004634f34e4d21856417381c588705cb32a2d7b400e29a9d6cdef006
SHA512165d63764d1853f39aacf6f26f2a87b873c597caa802c3a88084d33c765b32bf7c831b03adcd37cceea7adc083bc0c2f97c9fa60963c431f647d5602934d6b79
-
Filesize
2B
MD52b9d4fa85c8e82132bde46b143040142
SHA1a02431cf7c501a5b368c91e41283419d8fa9fb03
SHA2564658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142
SHA512c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be
-
Filesize
87KB
MD5b52632811d39c6413cb4c0cb1d3db011
SHA16cedd50085d66ec5044dc863b58b8327ed712424
SHA256012c10921ecc675c24217bd1a464815f20407bf49d30fd1f0c819f6dbc2abc23
SHA51277d62adfae04f2c4b5232f48ea907c6ab400507ab07a1a1de85a647c950dfe019ce9ec15b3953a512bb7ac9f1c7de4857d679d421bb845e64ae35908e01faf96
-
Filesize
87KB
MD586f710fef04851fd01d115b4841cb835
SHA1696703b0715697a6d8c1f9e5923a3acf9e71b216
SHA2565ed274e72beb1091d2d1394767108426672ff24423f5505a577e411583045c82
SHA512c52b60266bc333042417994e077910f2b793553d78e1941a2f81d38bde4ff56e73b674358df08a8a7900a91639d03fc31cc65ac4a03b23b2f2e0bb67e4c11c49
-
Filesize
87KB
MD5cc0048eba42733e44ce406370b7c25f3
SHA14e9deb4b81fdde3cfeda927318dcf6f66dfdfad1
SHA256c071532863c03bc6d3de11e0c0fb59424182a9ca899d828be0d064866849ba0d
SHA512788a70494e47f69b494f587361fe0c9b9a3e97a0d13c77dc436a61537cb93ca038a7d72c86062b1bacc16063c94e37c042336ba73fa7e189e97f7d7c87c4e853